id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2025-31467 | WordPress Flickr Photostream plugin <= 3.1.8 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Flickr Photostream allows Reflected XSS. This issue affects Flickr Photostream: from n/a through 3.1.8. | []
| null | 7.1 | null | null |
GHSA-46qm-6m33-4283 | The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka "SkyJack" or Bug ID CSCtb56664. | []
| null | null | null | null |
|
CVE-2025-5538 | BNS Featured Category <= 2.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | The BNS Featured Category plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bnsfc' shortcode in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
GHSA-q4j5-wx5j-vppx | The Allied Telesis AT-9000/24 Ethernet switch has a default password for its admin account, "manager," which allows remote attackers to perform unauthorized actions. | []
| null | null | null | null |
|
CVE-2017-16716 | A SQL Injection issue was discovered in WebAccess versions prior to 8.3. WebAccess does not properly sanitize its inputs for SQL commands. | [
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2018-14967 | An issue was discovered in EMLsoft 5.4.5. upload\eml\action\action.user.php has SQL Injection via the numPerPage parameter. | [
"cpe:2.3:a:emlsoft_project:emlsoft:5.4.5:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.5 |
|
CVE-2020-15498 | An issue was discovered on ASUS RT-AC1900P routers before 3.0.0.4.385_20253. The router accepts an arbitrary server certificate for a firmware update. The culprit is the --no-check-certificate option passed to wget tool used to download firmware update files. | [
"cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*"
]
| null | 5.9 | null | 4.3 |
|
GHSA-27x5-gpc9-m62h | Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | []
| null | null | null | null |
|
CVE-2024-48141 | A prompt injection vulnerability in the chatbox of Zhipu AI CodeGeeX v2.17.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message. | [
"cpe:2.3:a:zhipu_ai:codegeex:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2018-1000515 | ventrian News-Articles version NewsArticles.00.09.11 contains a XML External Entity (XXE) vulnerability in News-Articles/API/MetaWebLog/Handler.ashx.vb that can result in Attacker can read any file in the server or use smbrelay attack to access to server.. | [
"cpe:2.3:a:news-articles_project:news-articles:00.09.11:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-c5g6-6xf7-qxp3 | Umbraco CMS vulnerable to stored Cross-site Scripting in the "dictionary name" on Dictionary section | ImpactThis can be leveraged to gain access to higher-privilege endpoints, e.g. if you get a user with admin privileges to run the code, you can potentially elevate all users and grant them admin privileges or access protected content.PatchesWill be patched in 14.3.1 and 15.0.0.WorkaroundsEnsure that access to the Dictionary section is only granted to trusted users. | []
| null | 4.2 | null | null |
CVE-2002-1267 | Mac OS X 10.2.2 allows remote attackers to cause a denial of service by accessing the CUPS Printing Web Administration utility, aka "CUPS Printing Web Administration is Remotely Accessible." | [
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
RHSA-2024:2045 | Red Hat Security Advisory: unbound security update | unbound: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack) unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
]
| null | 6.5 | null | null |
GHSA-5gfj-h4p7-f68x | The Auto Amazon Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the style parameter in versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
CVE-2019-9927 | Caret before 2019-02-22 allows Remote Code Execution. | [
"cpe:2.3:a:caret:caret:*:*:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc11:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc12:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc13:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc14:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc15:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc16:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc17:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc18:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc19:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc20:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc21:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc22:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:caret:caret:4.0.0:rc9:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-fv7q-rvfh-pg5h | A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. | []
| null | 7.8 | null | null |
|
CVE-2013-5668 | The ADS/NT Support page on the Thecus NAS server N8800 with firmware 5.03.01 allows remote attackers to discover the administrator credentials by reading this page's cleartext content. | [
"cpe:2.3:o:thecus:n8800_nas_server_firmware:5.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:thecus:n8800_nas_server:-:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-656g-mpfg-9fw3 | Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'cmbQual' parameter of the Employer/InsertWalkin.php resource does not validate the characters received and they are sent unfiltered to the database. | []
| null | 9.8 | null | null |
|
CVE-2015-1006 | A vulnerable file in Opto 22 PAC Project Professional versions prior to R9.4006, PAC Project Basic versions prior to R9.4006, PAC Display Basic versions prior to R9.4f, PAC Display Professional versions prior to R9.4f, OptoOPCServer versions prior to R9.4c, and OptoDataLink version R9.4d and prior versions that were installed by PAC Project installer, versions prior to R9.4006, is susceptible to a heap-based buffer overflow condition that may allow remote code execution on the target system. Opto 22 suggests upgrading to the new product version as soon as possible. | [
"cpe:2.3:a:opto22:optodatalink:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opto22:optoopcserver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opto22:pac_display:*:*:*:*:basic:*:*:*",
"cpe:2.3:a:opto22:pac_display:*:*:*:*:professional:*:*:*",
"cpe:2.3:a:opto22:pac_project:*:*:*:*:basic:*:*:*",
"cpe:2.3:a:opto22:pac_project:*:*:*:*:professional:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2011-4356 | Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process. | [
"cpe:2.3:a:celeryproject:celery:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:celeryproject:celery:2.4.3:*:*:*:*:*:*:*"
]
| null | null | null | 6.9 |
|
GHSA-pc59-5wq3-w9vr | SQL injection vulnerability in header.php in NovaBoard 1.1.2 allows remote attackers to execute arbitrary SQL commands via the nova_name cookie parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
RHSA-2020:3915 | Red Hat Security Advisory: libssh2 security update | libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 6.5 | null |
GHSA-vwv2-7pwm-39x4 | The Filter & Grids WordPress plugin before 2.8.33 is vulnerable to Local File Inclusion via the post_layout parameter. This makes it possible for an unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files. | []
| null | 9.8 | null | null |
|
GHSA-3rxq-7p39-5hg9 | IBM DataPower Gateway 7.1.0.0 through 7.1.0.19, 7.2.0.0 through 7.2.0.16, 7.5.0.0 through 7.5.0.10, 7.5.1.0 through 7.5.1.9, 7.5.2.0 through 7.5.2.9, and 7.6.0.0 through 7.6.0.2 and IBM MQ Appliance 8.0.0.0 through 8.0.0.8 and 9.0.1 through 9.0.5 could allow a local user to cause a denial of service through unknown vectors. IBM X-Force ID: 144724. | []
| null | null | 5.5 | null |
|
GHSA-v75q-frvq-h73w | FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018. | []
| null | null | null | null |
|
CVE-2019-12970 | XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element. | [
"cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-6fvf-fhp3-g8cx | SAP BusinessObjects Analysis (edition for OLAP) - versions 420, 430, allows an attacker to exploit certain application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation could lead to exposure of some system specific data like its version. | []
| null | null | null | null |
|
CVE-2010-0377 | SQL injection vulnerability in modules/arcade/index.php in PHP MySpace Gold Edition 8.0 and 8.10 allows remote attackers to execute arbitrary SQL commands via the gid parameter in a play_game action. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:phpmyspace:phpmyspace:8.0:*:gold:*:*:*:*:*",
"cpe:2.3:a:phpmyspace:phpmyspace:8.10:*:gold:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-9727-xj59-f5g3 | UniFi Protect before v1.17.1 allows an attacker to use spoofed cameras to perform a denial-of-service attack that may cause the UniFi Protect controller to crash. | []
| null | 7.5 | null | null |
|
GHSA-g72w-qc26-qmpv | The YouTube Video Inserter WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/adminUI/settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.1.0. | []
| null | null | null | null |
|
CVE-2023-24399 | WordPress Ocean Extra Plugin <= 2.1.2 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in OceanWP Ocean Extra plugin <= 2.1.2 versions. | [
"cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:*"
]
| null | 5.5 | null | null |
GHSA-9p5f-5x8v-x65m | Directory traversal + file write causing arbitrary code execution | ImpactFrederic Linn (@FredericLinn) has reported a series of vulnerabilities that can result in directory traversal, file write, and potential remote code execution on Jellyfin instances. The general process involves chaining several exploits including a stored XSS vulnerability and can be used by an unprivileged user.The general process is (using the example of setting an intro video as the payload):Create a session as a low-priviledged user with a crafted authorization headerUpload an executable that contains a malicious plugin inline via /ClientLog/Document(Admin hovers over our device in dashboard -> XSS payload gets triggered)XSS Payload tries to set encoder path to our uploaded "log" file via /System/MediaEncoder/PathThe request fails, but in the process our executable actually runs (I guess for verifying if the path points to a valid ffmpeg version)The executable will create a plugin folder and place the inlined plugin DLL inside itThe XSS payload shuts down the server via /System/Shutdown (separate CVE in `jellyfin-web`)After (manually) starting the server, the plugin gets loaded and will:write a new video into the Jellyfin temp folder and register itregister this video as the new introand finally provide a malicious endpoint that simply executes system commands and sends back the resultsThe ability to write arbitrary content to log files was added in #5918 to allow flexibility to client logging.The following two sections detail Frederic's exact determinations regarding the two vulnerabilities.Directory traversal and file writeI've been reading the codebase here and there for a couple of days and found a directory traversal inside the ClientLogController, specifically /ClientLog/Document.The GetRequestInformation method retrieves the name and version of the client from the HttpContext.User object.Those values are attacker controlled when authenticating against the API. Both values are interpolated into a string, which ultimately ends up as an argument to Path.Combine().Setting a client name to the relative path "\..\..\..\..\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test" will write a file with completely attacker controlled content to the executing user's autostart directory.However, because the attacker only partially controls the filename, exploitation proves to be tricky. That's because the resulting file will always end in ".log", which means putting something in the autostart directory is only going to open notepad on startup. I mean, we can at least insult the user :^).Anyway, the next logical step would be to write into Jellyfin's plugins directory, but the sub-directories there (of which the already existing configurations directory conveniently counts as one!) are only getting scanned for ".dll" files.This stops an attacker from providing malicious DLLs that implement the correct interfaces in order to be recognized as legitimate plugins.On Linux, there might be more options. Running as the standard root user inside a container, an attacker could of course write anywhere. There's the very interesting "/etc/cron.d" directory, where an attacker can place cron jobs that get picked up automatically. Those files, however, can't contain a dot. Moreover, inside the container the cronjobs are probably not being executed, as the Jellyfin process should be only one running.For the stored XSS component, see https://github.com/jellyfin/jellyfin-web/security/advisories/GHSA-89hp-h43h-r5pqPatches10.8.10WorkaroundsN/AReferencesA complete write-up is available here: https://gebir.ge/blog/peanut-butter-jellyfin-time/ | []
| null | 8.8 | null | null |
GHSA-cv3x-4274-fr24 | ClipSoft REXPERT 1.0.0.527 and earlier version allows remote attacker to arbitrary file deletion by issuing a HTTP GET request with a specially crafted parameter. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. | []
| null | null | null | null |
|
GHSA-3jwm-v8r9-h7fv | IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128058. | []
| null | null | 6.7 | null |
|
GHSA-23jx-3fx9-64w9 | Cross-site scripting (XSS) vulnerability in index.php in GTP iCommerce allows remote attackers to inject arbitrary web script or HTML via the (1) cat and (2) subcat parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
GHSA-6q3f-rc7g-jc2x | A vulnerability in the shell access request mechanism of Cisco IOS XE Software could allow an authenticated, local attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by requesting access to the root shell of an affected device, after the shell access feature has been enabled. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device. | []
| null | null | 6.7 | null |
|
CVE-2016-9087 | SQL injection vulnerability in framework/modules/filedownloads/controllers/filedownloadController.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the fileid parameter. | [
"cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2018-8211 | A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows 10 Servers, Windows 10. This CVE ID is unique from CVE-2018-8201, CVE-2018-8212, CVE-2018-8215, CVE-2018-8216, CVE-2018-8217, CVE-2018-8221. | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 4.6 |
|
GHSA-wx45-qjwh-7qwp | Lack of input checks for SQL queries in ABB eSOMS versions 3.9 to 6.0.3 might allow an attacker SQL injection attacks against the backend database. | []
| null | 7.6 | null | null |
|
GHSA-m89c-gc36-4jv9 | SQL injection vulnerability in z_admin_login.asp in DataCheck Solutions LinkPal 1.x allows remote attackers to execute arbitrary SQL commands via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
GHSA-4m6j-mh25-2w47 | mod_access in Apache 1.3 before 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote attackers to bypass intended access restrictions. | []
| null | null | null | null |
|
CVE-2019-20513 | Open edX Ironwood.1 allows support/certificates?user= reflected XSS. | [
"cpe:2.3:a:edx:open_edx:2019-03-15:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2015-5562 | Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5555, and CVE-2015-5558. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2006-7203 | The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs"). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
GHSA-qfv5-xwm6-99c6 | Buffer Overflow vulnerability in quickjs.c in QuickJS, allows remote attackers to cause denial of service. This issue is resolved in the 2020-07-05 release. | []
| null | null | null | null |
|
CVE-2015-0677 | The XML parser in Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.28), 8.6 before 8.6(1.17), 9.0 before 9.0(4.33), 9.1 before 9.1(6), 9.2 before 9.2(3.4), and 9.3 before 9.3(3), when Clientless SSL VPN, AnyConnect SSL VPN, or AnyConnect IKEv2 VPN is used, allows remote attackers to cause a denial of service (VPN outage or device reload) via a crafted XML document, aka Bug ID CSCus95290. | [
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-4p4p-xhh6-7h75 | Cross-site scripting (XSS) vulnerability in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.1 allows remote attackers to inject arbitrary web script or HTML via crafted markup data, aka Bug ID CSCux15489. | []
| null | null | 6.1 | null |
|
RHSA-2023:0166 | Red Hat Security Advisory: dpdk security update | dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 8.6 | null | null |
GHSA-r5fv-qp85-97wv | Buffer overflow in British National Corpus SARA (sarad) allows remote attackers to execute arbitrary code by calling the client with a long string. | []
| null | null | null | null |
|
GHSA-2rpf-w4m3-hpq2 | Cross-site scripting (XSS) vulnerability in Wolf CMS 0.8.3.1 via the page editing feature, as demonstrated by /?/admin/page/edit/3. | []
| null | null | 4.8 | null |
|
GHSA-wg7g-4jwx-j6rf | The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator. | []
| null | 5.3 | null | null |
|
GHSA-wmmq-5crc-8g3h | Unspecified vulnerability in the TFTP server in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51), when configured to use a directory path name that contains a space character, allows remote authenticated users to read and overwrite arbitrary files via unspecified vectors. | []
| null | null | null | null |
|
RHSA-2024:4034 | Red Hat Security Advisory: Red Hat Service Interconnect 1.5.4 Release security update (images) | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm | [
"cpe:/a:redhat:service_interconnect:1::el9"
]
| null | 5.9 | null | null |
CVE-2008-3642 | Buffer overflow in ColorSync in Mac OS X 10.4.11 and 10.5.5 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via an image with a crafted ICC profile. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-wrvq-q9qh-872j | The GriceMobile com.grice.call application 4.5.2 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.iui.mobile.presentation.MobileActivity. | []
| null | 8.2 | null | null |
|
CVE-2021-30057 | A stored HTML injection vulnerability exists in Knowage Suite version 7.1. An attacker can inject arbitrary HTML in "/restful-services/2.0/analyticalDrivers" via the 'LABEL' and 'NAME' parameters. | [
"cpe:2.3:a:eng:knowage:*:*:*:*:*:*:*:*"
]
| null | 4.8 | null | 3.5 |
|
GHSA-c4wq-484p-4fxv | Unspecified vulnerability in the UFS filesystem functionality in Sun OpenSolaris snv_86 through snv_91, when running in 32-bit mode on x86 systems, allows local users to cause a denial of service (panic) via unknown vectors related to the (1) ufs_getpage and (2) ufs_putapage routines, aka CR 6679732. | []
| null | null | null | null |
|
GHSA-4r9c-wgm4-c72m | The TCL shell in Cisco IOS 12.2(14)S before 12.2(14)S16, 12.2(18)S before 12.2(18)S11, and certain other releases before 25 January 2006 does not perform Authentication, Authorization, and Accounting (AAA) command authorization checks, which may allow local users to execute IOS EXEC commands that were prohibited via the AAA configuration, aka Bug ID CSCeh73049. | []
| null | null | null | null |
|
GHSA-9mrf-rm77-2g6j | FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font. | []
| null | null | null | null |
|
GHSA-h6rp-8v4j-hwph | Apache Camel's XSLT component allows remote attackers to execute arbitrary Java methods | The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message. | []
| null | null | null | null |
CVE-2024-4473 | Sydney Toolbox <= 1.31 - Authenticated (Contributor+) Stored Cross-Site Scripting via aThemes: Portfolio Widget | The Sydney Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the "aThemes: Portfolio" widget in all versions up to, and including, 1.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:athemes:sydney_toolbox:*:*:*:*:*:*:*:*"
]
| null | 6.4 | null | null |
GHSA-26vr-8j45-3r4w | Jetty vulnerable to incorrect handling of invalid large TLS frame, exhausting CPU resources | ImpactWhen using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage.WorkaroundsThe problem can be worked around by compiling the following class:This class can be deployed by:The resulting class file should be put into a jar file (eg sslfix6072.jar)The jar file should be made available to the server. For a normal distribution this can be done by putting the file into ${jetty.base}/libCopy the file `${jetty.home}/modules/ssl.mod` to `${jetty.base}/modules`Edit the `${jetty.base}/modules/ssl.mod` file to have the following section:Copy the file `${jetty.home}/etc/jetty-https.xml` and`${jetty.home}/etc/jetty-http2.xml` to `${jetty.base}/etc`Edit files `${jetty.base}/etc/jetty-https.xml` and `${jetty.base}/etc/jetty-http2.xml`, changing any reference of `org.eclipse.jetty.server.SslConnectionFactory` to `org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory`. For example:Restart Jetty | []
| null | 7.5 | null | null |
GHSA-pxwx-g88v-cm98 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. Crafted data in a J2K file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17636. | []
| null | 5.5 | null | null |
|
GHSA-fvm9-qc7j-544c | Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the "a" tag. | []
| null | null | null | null |
|
GHSA-7398-c342-8qfj | Cross-site scripting (XSS) vulnerability in xmlservices/E_book.php in Elastix 2.3.0 allows remote attackers to inject arbitrary web script or HTML via the Page parameter. | []
| null | null | null | null |
|
GHSA-p736-g6pg-hjhw | ShopXO Vulnerable to Server-Side Request Forgery (SSRF) via Image Upload | ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) via image upload function. | []
| null | 6.3 | null | null |
CVE-2025-3864 | Connection pool exhaustion in hackney | Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library.
Fix for this issue has been included in 1.24.0 release. | []
| 2.3 | null | null | null |
GHSA-cqq2-vmgp-qv33 | Adobe Experience Manager versions 6.2 and earlier have an input validation issue in the WCMDebug filter that could be used in cross-site scripting attacks. | []
| null | null | 6.1 | null |
|
GHSA-7hf9-3q78-wpmp | The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile. | []
| null | null | 4.8 | null |
|
RHSA-2022:1819 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | golang: Command-line arguments may overwrite global data golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) golang: debug/macho: invalid dynamic symbol table command can cause panic golang: archive/zip: Reader.Open panics on empty string golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.1 | null | null |
cisco-sa-sd-wan-rhpbE34A | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges.
The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | 7.8 | null | null |
CVE-2020-27939 | This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2018-18337 | Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-3rwm-jg87-jp7c | An out-of-bound write can be triggered by a specially-crafted command supplied by a userspace application. in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA8081, QCA9377, QCA9379, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM660, SDX20, SDX24 | []
| null | null | null | null |
|
GHSA-jhq8-v7j2-6c7h | An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31911920. | []
| null | null | 7 | null |
|
CVE-2023-2273 | Rapid7 Insight Agent Directory Traversal | Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal. | [
"cpe:2.3:a:rapid7:insight_agent:*:*:*:*:*:*:*:*"
]
| null | 5.8 | null | null |
GHSA-mj8v-773w-5qhj | An issue was discovered in Mattermost Server before 3.0.0. It has a superfluous API in which the System Admin can change the account name and e-mail address of an LDAP account. | []
| null | null | null | null |
|
GHSA-vwfx-jcxg-cfx6 | Multiple PHP remote file inclusion vulnerabilities in MiniBill 2006-07-14 (1.2.2) allow remote attackers to execute arbitrary PHP code via (1) a URL in the config[include_dir] parameter in actions/ipn.php or (2) an FTP path in the config[plugin_dir] parameter in include/initPlugins.php. | []
| null | null | null | null |
|
CVE-2022-35046 | OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0466. | [
"cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
GHSA-74rv-62jv-rq8p | The News Element Elementor Blog Magazine WordPress plugin before 1.0.6 is vulnerable to Local File Inclusion via the template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files. | []
| null | 9.8 | null | null |
|
GHSA-x989-xh8p-mqvh | The WP Prayer WordPress plugin through 2.0.9 does not have CSRF check in place when updating its email settings, which could allow attackers to make a logged in admin change them via a CSRF attack | []
| null | 8.8 | null | null |
|
GHSA-p5p7-x2fv-868r | The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet. | []
| null | null | null | null |
|
GHSA-frvp-fph6-68p5 | An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the web-print.exe process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can be used to flood disk space and result in a Denial of Service (DoS) attack.Note:This CVE has been split from CVE-2024-4712. | []
| null | 6.1 | null | null |
|
CVE-2004-2079 | Red-M Red-Alert 2.7.5 with software 3.1 build 24 binds authentication to IP addresses, which allows remote attackers to bypass authentication by connecting from the same IP address as an active authenticated user. | [
"cpe:2.3:h:red-m:red-alert:2.7.5_v3.1_build_24:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2008-1786 | The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments. | [
"cpe:2.3:a:computer_associates:arcserve_backup_laptops_and_desktops:r11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_and_server_management:r11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2c1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_and_server_management:r11.2c2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_management_suite:r11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_management_suite:r11.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_management_suite:r11.2c1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:desktop_management_suite:r11.2c2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_asset_management:r11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2c1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_asset_management:r11.2c2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2c1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_desktop_management_bundle:r11.2c2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_remote_control:r11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2c1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_remote_control:r11.2c2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2c1:*:*:*:*:*:*:*",
"cpe:2.3:a:computer_associates:unicenter_software_delivery:r11.2c2:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-6433-x5p4-8jc7 | libxmljs vulnerable to type confusion when parsing specially crafted XML | libxmljs is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking a function on the result of `attrs()` that was called on a parsed node. This vulnerability might lead to denial of service (on both 32-bit systems and 64-bit systems), data leak, infinite loop and remote code execution (on 32-bit systems with the XML_PARSE_HUGE flag enabled). | []
| 9.2 | 8.1 | null | null |
CVE-2023-30480 | WordPress Educenter theme <= 1.5.5 - Broken Access Control | Missing Authorization vulnerability in Sparkle WP Educenter.This issue affects Educenter: from n/a through 1.5.5.
| []
| null | 4.3 | null | null |
GHSA-388j-hgw2-75wf | Rocket.Chat server before 3.9.0 is vulnerable to a self cross-site scripting (XSS) vulnerability via the drag & drop functionality in message boxes. | []
| null | null | null | null |
|
CVE-2021-38931 | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1, and 11.5 is vulnerable to an information disclosure as a result of a connected user having indirect read access to a table where they are not authorized to select from. IBM X-Force ID: 210418. | [
"cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.5:*:*:*:*:-:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
|
CVE-2024-27392 | nvme: host: fix double-free of struct nvme_id_ns in ns_update_nuse() | In the Linux kernel, the following vulnerability has been resolved:
nvme: host: fix double-free of struct nvme_id_ns in ns_update_nuse()
When nvme_identify_ns() fails, it frees the pointer to the struct
nvme_id_ns before it returns. However, ns_update_nuse() calls kfree()
for the pointer even when nvme_identify_ns() fails. This results in
KASAN double-free, which was observed with blktests nvme/045 with
proposed patches [1] on the kernel v6.8-rc7. Fix the double-free by
skipping kfree() when nvme_identify_ns() fails. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
CVE-2018-20353 | An invalid read of 8 bytes due to a use-after-free vulnerability during a "NULL test" in the mg_http_get_proto_data function in mongoose.c in Cesanta Mongoose Embedded Web Server Library 6.13 and earlier allows a denial of service (application crash) or remote code execution. | [
"cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2021-0232 | Paragon Active Assurance: Authentication bypass vulnerability in Control Center | An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2. | [
"cpe:2.3:a:juniper:paragon_active_assurance_control_center:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
| null | 7.4 | null | null |
GHSA-prhh-h793-h32r | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995. | []
| null | null | 7.5 | null |
CVE-2018-20356 | An invalid read of 8 bytes due to a use-after-free vulnerability in the mg_http_free_proto_data_cgi function call in mongoose.c in Cesanta Mongoose Embedded Web Server Library 6.13 and earlier allows a denial of service (application crash) or remote code execution. | [
"cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2021-38328 | Notices <= 6.1 Reflected Cross-Site Scripting | The Notices WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/notices.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.1. | [
"cpe:2.3:a:notices_project:notices:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | null |
GHSA-25r5-69f6-hgcg | Skype for Business Information Disclosure Vulnerability. | []
| null | 6.5 | null | null |
|
CVE-2017-9808 | OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS). | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2024-3857 | The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10. | [
"cpe:2.3:a:mozilla:firefox:125:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:115.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:115.10:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2008-7255 | login_screen.tcl in aMSN (aka Alvaro's Messenger) before 0.97.1 saves a password after logout, which allows physically proximate attackers to hijack a session by visiting an unattended workstation. | [
"cpe:2.3:a:amsn:amsn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:amsn:amsn:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:amsn:amsn:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:amsn:amsn:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:amsn:amsn:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:amsn:amsn:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:amsn:amsn:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:amsn:amsn:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:amsn:amsn:0.96:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 |
|
GHSA-ffgh-jp2r-65c7 | The management panel in Piwigo 2.9.3 has stored XSS via the virtual_name parameter in a /admin.php?page=cat_list request, a different issue than CVE-2017-9836. CSRF exploitation, related to CVE-2017-10681, may be possible. | []
| null | null | 5.4 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.